


default search action
Data & Knowledge Engineering, Volume 65, 2008
Volume 65, Number 1, April 2008
- Francesco Bonchi, Bradley A. Malin

, Yücel Saygin:
Recent advances in preserving privacy when mining data. 1-4 - Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham:

The applicability of the perturbation based privacy preserving data mining for real-world data. 5-21 - Tiancheng Li, Ninghui Li:

Towards optimal k-anonymization. 22-39 - Geetha Jagannathan, Rebecca N. Wright:

Privacy-preserving imputation of missing data. 40-56 - Wei Jiang, Chris Clifton, Murat Kantarcioglu:

Transforming semi-honest protocols to ensure accountability. 57-74 - George V. Moustakides, Vassilios S. Verykios

:
A MaxMin approach for hiding frequent itemsets. 75-89
- Kuen-Fang Jea, Ming-Yuan Chang:

Discovering frequent itemsets by support approximation and itemset clustering. 90-107 - Hua Yan, William I. Grosky, Farshad Fotouhi:

Augmenting the power of LSI in text retrieval: Singular value rescaling. 108-125 - Stefano Spaccapietra, Christine Parent, Maria Luisa Damiani, José Antônio Fernandes de Macêdo, Fábio Porto, Christelle Vangenot

:
A conceptual view on trajectories. 126-146 - Michael Peter Haustein, Theo Härder:

Optimizing lock protocols for native XML processing. 147-173
Volume 65, Number 2, May 2008
- Sanjay Kumar Madria, Sourav S. Bhowmick

:
Schema and web data management. 175-176 - Kajal T. Claypool:

SUSAX: Context-specific searching in XML documents using sequence alignment techniques. 177-197 - Sven Groppe

, Jinghua Groppe, Stefan Böttcher:
Simplifying XPath queries for optimization with regard to the elimination of intersect and except operators. 198-222 - Richard T. Snodgrass, Curtis E. Dyreson

, Faiz Currim
, Sabah Currim, Shailesh Joshi:
Validating quicksand: Temporal schema versioning in tauXSchema. 223-242 - Mingzhu Wei, Elke A. Rundensteiner, Murali Mani, Ming Li:

Processing recursive XQuery over XML streams: The Raindrop approach. 243-265 - Sanjay Madria, Kalpdrum Passi

, Sourav S. Bhowmick
:
An XML Schema integration and query mechanism system. 266-303
- Fusheng Wang

, Carlo Zaniolo:
Temporal queries and version management in XML-based document archives. 304-324 - Philipp Cimiano

, Peter Haase, Jörg Heizmann, Matthias Mantel, Rudi Studer:
Towards portable natural language interfaces to knowledge bases - The case of the ORAKEL system. 325-354 - Iraj Mahdavi, Namjae Cho, Babak Shirazi

, Navid Sahebjamnia
:
Designing evolving user profile in e-CRM with dynamic clustering of Web documents. 355-372
Volume 65, Number 3, June 2008
- Yuhua Qian, Chuangyin Dang

, Jiye Liang
, Haiyun Zhang, Jianmin Ma:
On the evaluation of the decision performance of an incomplete decision table. 373-400 - Shu-Ming Hsieh, Chiun-Chieh Hsu:

Graph-based representation for similarity retrieval of symbolic images. 401-418 - Eladio Domínguez

, Jorge Lloret, Ángel Luis Rubio
, María Antonia Zapata
:
MeDEA: A database evolution architecture with traceability. 419-441 - Wan-Jui Lee, Jung-Yi Jiang, Shie-Jue Lee:

Mining fuzzy periodic association rules. 442-462 - En Tzu Wang, Guanling Lee:

An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining. 463-484 - Matteo Palmonari

, Gianluigi Viscusi, Carlo Batini:
A semantic repository approach to improve the government to business relationship. 485-511 - Sungjune Park

, Nallan C. Suresh, Bong-Keun Jeong:
Sequence-based clustering for Web usage mining: A new experimental framework and ANN-enhanced K-means algorithm. 512-543

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














